Be Your Own Security Expert: Difference between revisions

Line 85: Line 85:


===Backups===
===Backups===
The importance of  regular backups cannot be overstated. Many people don't learn the lesson until they loose something vital through a hard disk crash, an accidental deletion or data corruption, or loss or theft of your computer.
The importance of  regular backups cannot be overstated. Many people don't learn the lesson until they loose something vital through a hard disk crash, an accidental deletion or data corruption, or loss or theft of their computer.


You can regularly copy important files to a memory stick, but the chances are you will have forgotten when disaster strikes, and if your house burns down you probably will have lost both your computer and your memory stick (not to mention your house).
You can regularly copy important files to a memory stick, but the chances are you will have forgotten when disaster strikes, and if your house burns down you probably will have lost both your computer and your memory stick (not to mention your house).
Line 97: Line 97:


Wikipedia contains a list of many [https://en.wikipedia.org/wiki/Comparison_of_online_backup_services online backup services]. These generally work in the background, continuously sending files to a remote server as they are updated. Some of these offer a limited amount of storage for free. If you are concerned about privacy, use one which offers "zero knowledge" encryption. This means that the data is encrypted before it leaves your computer and that the online service itself has no way to decrypt it, since you have the only copy of the encryption key.
Wikipedia contains a list of many [https://en.wikipedia.org/wiki/Comparison_of_online_backup_services online backup services]. These generally work in the background, continuously sending files to a remote server as they are updated. Some of these offer a limited amount of storage for free. If you are concerned about privacy, use one which offers "zero knowledge" encryption. This means that the data is encrypted before it leaves your computer and that the online service itself has no way to decrypt it, since you have the only copy of the encryption key.
===Data Destruction===
When you dispose of a computer, hard disk or memory stick, be sure that it contains no sensitive personal data. Simply deleting files or even reformatting a disk or memory stick leaves most of the data still recoverable using simple and freely available tools.
If you are selling it or giving it away you should use a disk wiping tool, of which there are several freely available. That up to 35 overwrites might be needed is an urban legend. If you were James Bond on a mission to save the planet you might choose 2 passes but even that is probably overkill.
If the disk to be wiped is not your system disk, you can use [https://www.piriform.com/ccleaner Ccleaner]. Under Tools, choose Disk Wiper.
To wipe a computer's system disk in the computer itself you will need a tool which runs from bootable USB media or from a CD. [http://www.dban.org/ DBAN] is a Linux-based utility which comes as a bootable disk image. [http://cmrr.ucsd.edu/people/Hughes/secure-erase.html CMRR SecureErase] is a utility which can run from a bootable DOS disk and uses a built in function of modern hard disks to effect a complete erasure.
If you don't want to reuse the disk the quickest and safest option is to physically smash it with a hammer. In modern disk  drives the disk itself is often made of glass which should shatter into many pieces. Your job is done if you can hear them rattling about inside. If not, unscrew the lid and hit the disk directly, but be aware that if it's glass it may disintegrate into dangerous flying shards.
In the case of an SSD (solid state disk) or memory stick, the way that it stores data in order to even out wear makes it impossible to be sure you've overwritten it all. Smashing it with a hammer until you are convinced individual storage chips are cracked is the only sure way of putting your data beyond reach.


==External links==
==External links==

Revision as of 22:43, 18 December 2015

Security tips we should all be following. (This page is work in progress.)

Summary

Modern computers and mobile devices store vast amounts of information, some of it sensitive, and yet more of our data is in "the cloud", held by corporations such as Facebook and Google. Just as we've learned that keeping a front door key under the door mat might not be a good idea, there are important and not always obvious lessons we need to learn about keeping our digital lives safe. The basics are covered here.

The first section following this should be understandable by anyone, but later sections may assume you're comfortable with setting up and configuring your device.

Security Top Tips

Google carried out research comparing the top security tips given by security experts with the top security measures general users believed were important, and found worrying differences, as shown below.

Non-Security Expert Security Expert
1 Use antivirus software
Free antivirus products are available so certainly use one. But they can give you a false sense of security since they are far from infallible. Virus authors continually evolve their wares, testing them against a whole slew of antivirus products to ensure they can slip under your radar.
Install software updates
Malware generally gets its foothold through unpatched vulnerabilities. People sometimes worry that updates might break something. You might want to wait a few days to give the vendor time to pull a bad patch but no more. Professionals are unanimous that proactive defence by installing updates is much better than reactive defence using antivirus.
2 Use strong passwords
Yes of course use strong passwords, but just as important, don't reuse them across multiple sites.
Use unique passwords
If one site leaks your password the bad guys will try it on many other sites to see what else they can compromise.
3 Change passwords often
This is an age-old myth that has been accepted as fact in many circles. If you know or suspect that your password might have bee compromised, change it as soon as you can, but if it's hard to think of a good password you can remember, it's still harder to think of a new good one every few months. Whilst changing your password is of some value, if it's leaked you may still be at risk for a number of weeks. Much better to choose a really good one, take care of it and stick with it.
Use 2-factor authentication
A password is "something you know" - a secret that can easily escape. The bar is raised very considerably by requiring you to demonstrate your possession of "something you have" (such as a token or a mobile phone) or "something you are" (such as a fingerprint or iris scan).
4 Only visit websites you know
Oh for the good old days when you could feel reasonably safe if you steered clear of dodgy sites such as porn, gambling and hacking. Today, even the most reputable websites have been known to host 3rd party ads containing malicious content, and the bad guys regularly perform automated scans for vulnerable sites which they can infect, which could include your local football club or that of a national newspaper. Now do you understand why patching is the top of the list?
Use strong passwords
Yes of course use strong passwords, and strong means long. Making your password just a few characters longer strengthens it more than using upper and lower case, numbers and symbols.
5 Don't share personal information
Of course, be careful what you share online and who you share it with, especially personal information which could lead to identity theft or the discovery of the answers to the "secret questions" many sites use for lost password recovery. But sensibly used, social networks can be fun and a good way of keeping up with friends and relations.
Use a password manager
People often worry that to use a password manager is to put all their eggs in one basket. Well, it is, and make sure you use a widely recommended one, but with a really good master password the benefit is overwhelming. Never again struggle to remember a website's password or be tempted to choose a weak one or one shared among different sites, and let the password manager choose totally random and completely unguessable passwords for you.

What have you got to worry about?

For a law-abiding private individual the threat comes almost exclusively from criminals.

People often say that they have nothing of value on their computer so why should they worry? In fact you have more than you think, as described in this blog posting. And don't forget that your smartphone is a fully fledged computer too.

  • Your address book or contacts list is a primary target. With this, an attacker can send malicious emails to all your friends, making them appear to come from yourself. Some of your friends may then fall for social engineering tricks, click on links or open attachments in these emails.
  • Login credentials to online banking, PayPal and shopping or auction sites can and will be used to defraud you.
  • Login credentials to your email account can be used in the same ways as your address book, but worse. With full control of your email an attacker will be able to reset the passwords to many different websites.
  • Login credentials to social networking sites can be used to send malicious messages to your fiends.
  • Your computer may contain enough personal information to facilitate identity theft, particularly if the attacker can gain access to your social networking sites. He may be able to complement the information he gains from your computer with information from other sources.
  • Your computer may be recruited into a bot net. This is a large collection of compromised computers under the control of the attacker (the "bot herder") and used to attack websites or send out large quantities of malicious emails. Not only will your computer then be engaging in criminal activity, but it will be running slow ad swamping your network connection with traffic.
  • You may be infected by ransomware. This encrypts all your files and demands payment for the decryption key.

Additional tips

  • Reduce your attack surface
  • Unsolicited attachments/phishing
  • Backups - 3 copies, 2 media types, 1 offsite
  • Data destruction
  • Encryption
  • Public networks
  • Physical security

Reduce your attack surface

Each piece of software on your system could contain security vulnerabilities so it makes sense to uninstall things you don't need. This is critically important when it comes to browser plug-ins as these can often be directly invoked by websites you might visit.

In particular, uninstall the Java plugin if you have it. It is required by a tiny number of websites and has a poor security record.

Likewise, Flash has been plagued by problems, often exploited by malicious Flash-based adverts. Google for instructions for setting it to click-to-play in your favourite browser.

Unsolicited emails

If you receive an unsolicited email, clicking a link in it or opening an attachment can really spoil your day. This is probably the commonest way to get infected with something bad.

Such emails are normally part of a "phishing" campaign in which malicious emails are sent to large numbers of email addresses. Sometimes they are very crude, simply containing a link you may be tempted to click, just out of curiosity. Other times they may be quite cunning, e.g. making out there is a package addressed to you awaiting delivery. Since forging the sender's address in an email is trivially easy, the email may even appear to come from someone you know if their contacts list has been compromised.

To avoid getting caught, you should treat all emails you weren't expecting with the greatest of suspicion unless you are quite certain the sender is genuine.

Also, make sure your system is fully patched and updated in order to eliminate (as far as possible) the vulnerabilities a malicious email might try to exploit.

Backups

The importance of regular backups cannot be overstated. Many people don't learn the lesson until they loose something vital through a hard disk crash, an accidental deletion or data corruption, or loss or theft of their computer.

You can regularly copy important files to a memory stick, but the chances are you will have forgotten when disaster strikes, and if your house burns down you probably will have lost both your computer and your memory stick (not to mention your house).

Best practice is to follow the 3-2-1 principle:

  • Keep 3 copies of your data
  • Keep your data on 2 different computers or storage devices
  • Keep 1 of those copies off-site, e.g. using an online backup service or on a memory stick with a trusted friend.

Windows provides a backup utility. Get yourself a memory stick or external hard drive to use with this. You can select which files and folders to back up.

Wikipedia contains a list of many online backup services. These generally work in the background, continuously sending files to a remote server as they are updated. Some of these offer a limited amount of storage for free. If you are concerned about privacy, use one which offers "zero knowledge" encryption. This means that the data is encrypted before it leaves your computer and that the online service itself has no way to decrypt it, since you have the only copy of the encryption key.

Data Destruction

When you dispose of a computer, hard disk or memory stick, be sure that it contains no sensitive personal data. Simply deleting files or even reformatting a disk or memory stick leaves most of the data still recoverable using simple and freely available tools.

If you are selling it or giving it away you should use a disk wiping tool, of which there are several freely available. That up to 35 overwrites might be needed is an urban legend. If you were James Bond on a mission to save the planet you might choose 2 passes but even that is probably overkill.

If the disk to be wiped is not your system disk, you can use Ccleaner. Under Tools, choose Disk Wiper.

To wipe a computer's system disk in the computer itself you will need a tool which runs from bootable USB media or from a CD. DBAN is a Linux-based utility which comes as a bootable disk image. CMRR SecureErase is a utility which can run from a bootable DOS disk and uses a built in function of modern hard disks to effect a complete erasure.

If you don't want to reuse the disk the quickest and safest option is to physically smash it with a hammer. In modern disk drives the disk itself is often made of glass which should shatter into many pieces. Your job is done if you can hear them rattling about inside. If not, unscrew the lid and hit the disk directly, but be aware that if it's glass it may disintegrate into dangerous flying shards.

In the case of an SSD (solid state disk) or memory stick, the way that it stores data in order to even out wear makes it impossible to be sure you've overwritten it all. Smashing it with a hammer until you are convinced individual storage chips are cracked is the only sure way of putting your data beyond reach.

External links

  • External links (if any) as bullet points.
  • If non, delete this section.